On Mon, Apr 03, 2017 at 04:29:57PM +0800, Liping Zhang wrote: > From: Liping Zhang <zlpnobody@xxxxxxxxx> > > Typing the "nft add rule x y ct mark set jhash ip saddr mod 2" will > not generate a random seed, instead, the seed will always be zero. > > So if seed option is empty, we shoulde not set the NFTA_HASH_SEED > attribute, then a random seed will be generted in the kernel. > > Also: just to keep it simple, "seed 0" is equal to "seed opt is empty", > since this is not a big problem. > > Signed-off-by: Liping Zhang <zlpnobody@xxxxxxxxx> > --- > Note, another kernel patch is necessary to avoid the annoying warning > from "nft-test.py ip/hash.t": > ip/hash.t: WARNING: line: 5: 'src/nft add rule --debug=netlink ip test-ip4 > pre ct mark set jhash ip saddr . ip daddr mod 2': 'ct mark set jhash ip saddr > . ip daddr mod 2' mismatches 'ct mark set jhash ip saddr . ip daddr mod 2 > seed 0xd6ab633c' > > src/netlink_linearize.c | 3 ++- > tests/py/ip/hash.t | 1 + > tests/py/ip/hash.t.payload | 7 +++++++ > 3 files changed, 10 insertions(+), 1 deletion(-) > > diff --git a/src/netlink_linearize.c b/src/netlink_linearize.c > index b2f27b7..0dba658 100644 > --- a/src/netlink_linearize.c > +++ b/src/netlink_linearize.c > @@ -139,7 +139,8 @@ static void netlink_gen_hash(struct netlink_linearize_ctx *ctx, > } > netlink_put_register(nle, NFTNL_EXPR_HASH_DREG, dreg); > nftnl_expr_set_u32(nle, NFTNL_EXPR_HASH_MODULUS, expr->hash.mod); > - nftnl_expr_set_u32(nle, NFTNL_EXPR_HASH_SEED, expr->hash.seed); > + if (expr->hash.seed) > + nftnl_expr_set_u32(nle, NFTNL_EXPR_HASH_SEED, expr->hash.seed); I prefer we have a hash.seed_set, instead of relying on 0 meaning "unset". I'm thinking of people willing to implement some sort of poor man symmetric hashing with two rules, one per each direction. The seed needs to be the same so the jhash is consistent. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html